Skip to main content

Three Novel Algorithms for Hiding Data in PDF Files Based on Incremental Updates

  • Conference paper
  • 2505 Accesses

Part of the Lecture Notes in Computer Science book series (LNSC,volume 7128)

Abstract

PDF is a widely used document format. By studying the structure of PDF file, we notice that incremental updates method used by PDF file can be used to embed information for covert communication. So in this paper, we present three novel data hiding algorithms based on incremental updates which can provide large enough embedding capacity without any change of file display. These algorithms embed information by different covert channels and the logistic chaotic map is used to enhance the security of the embedded data. The experimental results show that the algorithms are also robust to PDF files annotating, marking and interactive forms editing.

Keywords

  • Incremental Updates
  • Security
  • Embedding Capacity
  • Robust

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Adobe Systems Incorporated. PDF Reference, 5th edn., version 1.6 (2006), http://www.adobe.com/devnet/pdf/pdfs/PDFReference16.pdf

  2. Low, S.H., Maxemchuk, N.F.: Performance comparison of two text marking methods. IEEE Journal on Selected Areas in Communications 16(4), 561–572 (1998)

    CrossRef  Google Scholar 

  3. Brassil, J.T., et al.: Electronic marking and identification techniques to discourage document copying. IEEE Journal on Selected Areas in Communications 13(8), 1495–1504 (1995)

    CrossRef  Google Scholar 

  4. Zhong, S., Chen, T.: Information Steganography Algorithm Based on PDF Documents. Computer Engineering 32(3), 161–163 (2006)

    MathSciNet  Google Scholar 

  5. Low, S.H., et al.: Document marking an identification using both line and word shifing. In: Proceedings INFOCOM 1995, Boston, MA, pp. 853–860 (April 1995)

    Google Scholar 

  6. Maxemchuk, N.F., Low, S.H.: Marking text documents. In: Proceedings, International Conference Image Processing, Boston, Santa Barbara, CA, October 1997, pp. 13–17 (1997)

    Google Scholar 

  7. Franz, E., Pfitzmann, A.: Steganography Secure against Cover-Stego-Attack. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 29–46. Springer, Heidelberg (2000)

    CrossRef  Google Scholar 

  8. wbStego Studio. The steganography tool wbStego4 (2007), http://www.wbailer.com/wbstego

  9. Liu, Y., Sun, X., Luo, G.: A Novel Information Hiding Algorithm Based on Structure of PDF Document. Computer Engineering 32(17), 230–232 (2006)

    Google Scholar 

  10. Liu, X., Zhang, Q., Tang, C., Zhao, J., Liu, J.: A Steganographic Algorithm for Hiding Data in PDF Files Based on Equivalent Transformation. In: 2008 International Symposiums on Information Processing (ISIP), May 23-25, pp. 417–421 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liu, H., Li, L., Li, J., Huang, J. (2012). Three Novel Algorithms for Hiding Data in PDF Files Based on Incremental Updates. In: Shi, Y.Q., Kim, HJ., Perez-Gonzalez, F. (eds) Digital Forensics and Watermarking. IWDW 2011. Lecture Notes in Computer Science, vol 7128. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32205-1_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-32205-1_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-32204-4

  • Online ISBN: 978-3-642-32205-1

  • eBook Packages: Computer ScienceComputer Science (R0)